Turn off light

Hackers of CypherCon Season 2 Episode 14

In this talk, learn various tools and techniques that can be used to thoroughly analyze a malicious email attachment and everything that comes after it. In order to get as many stones as possible, we will want to leave no stone unturned. This information can then be used to look for indicators of compromise throughout your environment.

Episode Title: Always Look a Gift (Trojan) Horse In the Mouth with James Arndt

Air Date: 2019-12-20